On Mon, Aug 18, 2008 at 04:21:41PM -0400, Brian Miller wrote:
> Not a big deal. I will be sure to just mount and dismount the USB drives
> manually. They are just there to store a config and log backup on the
> firewall.

If an attacker has gained access to the system, anything mounted locally
should be deemed unreliable.

> I am doing this so that if I have a failure or attack or some
> other type of crash. I will be able to check out the latest config and
> logs.

I suppose that you know that you can use syslogd to log to another
machine? And you could use logger(1) to read config files into the log.

That would be much safer because it's a one-way street. You can log to
another machine, but you cannot delete from the logfile on the other
machine, unless it's compromised as well.

Roland
-- 
R.F.Smith                                   http://www.xs4all.nl/~rsmith/
[plain text _non-HTML_ PGP/GnuPG encrypted/signed email much appreciated]
pgp: 1A2B 477F 9970 BA3C 2914  B7CE 1277 EFB0 C321 A725 (KeyID: C321A725)

Attachment: pgpSCYk5XwyPW.pgp
Description: PGP signature

Reply via email to